Security
-
Kaseya VSA Zero-Day Supply Chain Ransomware Attack
Attackers carried out a supply chain ransomware attack by leveraging a zero-day vulnerability in Kaseya’s VSA software on Friday July…
Read more -
How to select the best endpoint security solutions in 2021
The thought that a chain is only as strong as its weakest link is something that can keep IT security…
Read more -
JBS Ransomware attack highlights need for early detection and rapid response
Over the past couple of months cyber-criminals have targeted organizations critical to our supply chain. The most recent of these…
Read more -
MITRE Engenuity’s ATT&CK R3
The highly anticipated results of MITRE Engenuity’s ATT&CK R3 Evaluations are now available. The third round of evaluations tested 29 Endpoint Detection & Response products…
Read more -
Top 5 differences between information assurance vs. cybersecurity
There are many ways to help safeguard sensitive and confidential information within an enterprise. Amongst the most popular are information…
Read more -
RIG Exploit Kits exploit Internet Explorer delivering Dridex Trojan
The RIG Exploit Kit (EK), which was discovered in 2014, is known to exploit vulnerabilities in Microsoft’s Internet Explorer browser…
Read more -
5 leadership lessons from the pandemic
Every area of business has faced its own challenges over the past 15 months—from sales and marketing, to customer support and product development. On top of all that, cyber threats have grown as criminals…
Read more -
Addressing cyber resilience gaps across key infrastructure assets
The ransomware attack on Colonial Pipeline was yet another wake up call for critical infrastructure and supply chains to rethink their approach…
Read more -
4 reasons why technology is vital—during and after ‘unprecedented’ times
Organizations rely on information to anticipate trends, take advantage of new opportunities, and succeed in today’s world. As organizations around…
Read more -
Banks are fighting a multi-front war on fraud
According to S&P Global, the COVID-19 pandemic caused a “perfect storm” for financial services companies, which witnessed a 238 percent…
Read more -
Why information assurance and security is important in 2021
In March 2021, Chinese hackers broke into Microsoft Exchange Server and stole emails from over 250,000 customers worldwide. This raises…
Read more -
Security in the healthcare spotlight
One of the most significant priorities facing healthcare in 2021 is the need for improved security. The rapid move to…
Read more -
Lessons from the SolarWinds attack: How to protect your business
By the time it was discovered in December, the SolarWinds cyber attack had evaded the security defenses of and penetrated…
Read more -
The HAFNIUM Attack on the on-premises Microsoft Exchange Server
On March 2, Microsoft announced that its on-premises Exchange Server had experienced multiple 0-day exploits. Microsoft commented: “In the attacks…
Read more -
Announcing OpenText Security and Protection Cloud CE 21.1
Large-scale cyberattacks have recorded a 5-fold increase during the pandemic. The recent SolarWinds breach, potentially the first of many such…
Read more -
After SolarWinds, worldwide governments can trust no one
The effects of the SolarWinds attack will be felt for a long time, and will ripple far beyond the government…
Read more -
Achieving seamless eDiscovery
Business and litigation go hand in hand in the 21st century. From litigation support personnel to the lawyers themselves, organizations face a common challenge: how to streamline…
Read more -
SolarWinds: Threat hunt to contain and eradicate
As the cyberattack story continues to unfold around the SUNBURST and SUPERNOVA malware distributed through a compromised SolarWinds software update,…
Read more -
Meeting the new challenges of digital evidence management
Dealing with the scale and complexity of evidence in rich-media formats (images, video and audio) is one of the key…
Read more